0% found this document useful (0 votes)
5 views23 pages

Network Security

The document outlines the fundamentals of network security, covering threats such as malware, phishing, and denial of service attacks, as well as protective measures including firewalls, encryption, and legal frameworks. It emphasizes the importance of a multi-layered defense strategy and the role of encryption in maintaining data confidentiality and authenticity. Legal approaches to cybersecurity are discussed, highlighting the complexities of enforcement and the limitations of legal remedies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views23 pages

Network Security

The document outlines the fundamentals of network security, covering threats such as malware, phishing, and denial of service attacks, as well as protective measures including firewalls, encryption, and legal frameworks. It emphasizes the importance of a multi-layered defense strategy and the role of encryption in maintaining data confidentiality and authenticity. Legal approaches to cybersecurity are discussed, highlighting the complexities of enforcement and the limitations of legal remedies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Network Security Fundamentals

From Threats to Protections, Encryption, and Law

August 15, 2025

Network Security Fundamentals August 15, 2025 1 / 23


Outline

1 Security Overview

2 Forms of Attack

3 Protection and Cures

4 Encryption

5 Legal Approaches

Network Security Fundamentals August 15, 2025 2 / 23


Security Overview

Why Security Matters

▶ Networked computers face risks of unauthorized access and vandalism.


▶ Attacks may deploy malware locally or act remotely over the network.
▶ Goals vary: disruption (e.g., DoS) or data theft and misuse.

Network Security Fundamentals August 15, 2025 3 / 23


Forms of Attack

Malware: Key Categories

▶ Viruses: insert into host programs; execute with host; may replicate or corrupt OS/data.
▶ Worms: self-propagate over networks; replication can overwhelm hosts and networks.
▶ Trojan Horses: appear beneficial; execute hidden harmful actions, sometimes on a
trigger.
▶ Spyware (”sniffing software”): silently collects and exfiltrates user/system activity.

Network Security Fundamentals August 15, 2025 4 / 23


Forms of Attack

Social Engineering Vector: Phishing

▶ Phishing: asking victims directly for sensitive data under false pretenses.
▶ Often via email impersonating banks, agencies, or law enforcement.
▶ Harvests passwords, credit card numbers, and other credentials.

Network Security Fundamentals August 15, 2025 5 / 23


Forms of Attack

Remote Attacks: Denial of Service (DoS)

▶ DoS: flood a target with messages to disrupt legitimate service.


▶ Botnets: attacker-controlled fleets of compromised machines launch the flood on signal.
▶ Availability of unprotected PCs fuels DoS capacity.

Network Security Fundamentals August 15, 2025 6 / 23


Forms of Attack

Spam and Related Risks

▶ Spam: unsolicited bulk email; overloads the user rather than systems.
▶ Common vehicle for phishing, Trojans, and virus distribution.

Network Security Fundamentals August 15, 2025 7 / 23


Protection and Cures

Firewalls

▶ Filter traffic at network gateways or on individual hosts.


▶ Block known-bad sources; restrict unneeded services/ports.
▶ Help terminate DoS by blocking attacking origins.
▶ Prevent spoofing: block inbound messages falsely claiming internal origins.

Network Security Fundamentals August 15, 2025 8 / 23


Protection and Cures

Spam Filters

▶ Specialized firewalls for email; distinguish spam vs. legitimate messages.


▶ Often use learning/training to improve accuracy (e.g., probabilistic/AI methods).

Network Security Fundamentals August 15, 2025 9 / 23


Protection and Cures

Proxy Servers

▶ Intermediary between client and server (FTP, HTTP, Telnet, etc.).


▶ Hides internal clients from external servers; reduces leakage of intranet structure.
▶ Can inspect/filter server responses (e.g., scan incoming files for known viruses).

Network Security Fundamentals August 15, 2025 10 / 23


Protection and Cures

Auditing and Monitoring

▶ Track traffic volumes and patterns; monitor firewall activity.


▶ Detect irregularities early; primary tool for admins to contain issues.

Network Security Fundamentals August 15, 2025 11 / 23


Protection and Cures

Antivirus and Safe Practices

▶ Use antivirus/anti-spyware tools; keep signatures and engines up to date.


▶ Exercise caution: avoid unknown attachments, unverified downloads, and pop-ups.
▶ Disconnect from the Internet when not necessary to reduce exposure.

Network Security Fundamentals August 15, 2025 12 / 23


Encryption

Why Encrypt?

▶ Passwords control access, but in-transit data may traverse untrusted intermediaries.
▶ Encryption preserves confidentiality even if messages are intercepted.
▶ Many applications provide secure versions (e.g., HTTPS).

Network Security Fundamentals August 15, 2025 13 / 23


Encryption

HTTPS and SSL

▶ HTTPS: secure HTTP used by financial and other sensitive services.


▶ Built on Secure Sockets Layer (SSL) protocols to protect client-server links.
▶ Browsers indicate secure sessions (e.g., padlock icon).

Network Security Fundamentals August 15, 2025 14 / 23


Encryption

Public-Key Encryption (PKE)

▶ Two keys: public key (encrypt) and private key (decrypt).


▶ Anyone can encrypt to the holder; only the private-key holder can decrypt.
▶ Intermediaries knowing the public key still cannot decrypt.

Network Security Fundamentals August 15, 2025 15 / 23


Encryption

Key Authenticity and Certificates

▶ Risk: spoofed public keys (impersonation of a bank, etc.).


▶ Certificate Authorities (CAs) provide certificates: bind identities to public keys.
▶ Organizations may operate internal CAs for tighter control.

Network Security Fundamentals August 15, 2025 16 / 23


Encryption

Digital Signatures

▶ Some PKE schemes allow encrypting with the private key to produce a signature.
▶ Verification with the public key assures authenticity of the signer.
▶ A signature can be the encrypted form of the message (or a digest).

Network Security Fundamentals August 15, 2025 17 / 23


Legal Approaches

Limits of Legal Remedies

▶ Illegality provides recourse, not prevention.


▶ Internet is international: jurisdictional complexity hinders enforcement.
▶ International bodies (e.g., courts) may be needed for cross-border cases.

Network Security Fundamentals August 15, 2025 18 / 23


Legal Approaches

Key U.S. Laws and Issues

▶ Computer Fraud and Abuse Act (CFAA): prosecutes worms/viruses, unauthorized


access, theft of value.
▶ Electronic Communications Privacy Act (ECPA): protects privacy; limits interception
and provider disclosure.
▶ Employer monitoring often hinges on authorization when using employer equipment.

Network Security Fundamentals August 15, 2025 19 / 23


Legal Approaches

Government Monitoring and Controversies

▶ Agency monitoring under restrictions; debates over scope and oversight.


▶ Examples: FBI Carnivore (2000); USA PATRIOT Act (2001); later revelations of bulk
data collection (2013).
▶ CALEA: mandates telecom capabilities for lawful intercept—complex and costly to
implement.

Network Security Fundamentals August 15, 2025 20 / 23


Legal Approaches

Encryption vs. Monitoring

▶ Strong encryption limits the value of intercepted data to law enforcement.


▶ Proposals for key registration/escrow raise corporate privacy and security concerns.
▶ Central question: How secure can key registration be?

Network Security Fundamentals August 15, 2025 21 / 23


Legal Approaches

Cybersquatting and Domain Names

▶ Anticybersquatting Consumer Protection Act (1999): protects against confusingly


similar domain names.
▶ Does not ban domain speculation, but restricts trademark-impersonating names.
▶ Example: generic names (e.g., GreatUsedCars.com) vs. protected business names.

Network Security Fundamentals August 15, 2025 22 / 23


Summary

Takeaways

▶ Threats span malware, social engineering, and network-level attacks.


▶ Defense-in-depth: firewalls, proxies, spam filters, auditing, antivirus, and safe user
behavior.
▶ Encryption (HTTPS, PKE, certificates, signatures) safeguards confidentiality and
authenticity.
▶ Legal frameworks aid deterrence and recourse, but technical controls remain essential.

Network Security Fundamentals August 15, 2025 23 / 23

You might also like